Suggested Topics within your search.
Suggested Topics within your search.
- Design 10
- Design and construction 10
- Research 7
- Methodology 6
- Web sites 6
- Dressmaking 4
- History 4
- Management 4
- Study and teaching 4
- Computer networks 3
- Computer-aided design 3
- Economic development 3
- Evaluation research (Social action programs) 3
- Human-computer interaction 3
- Moral and ethical aspects 3
- Pattern design 3
- Visual communication 3
- methods 3
- Advertising 2
- Application software 2
- Commercial art 2
- Computer animation 2
- Computer programs 2
- Computer-assisted instruction 2
- Curricula 2
- Curriculum planning 2
- Economic policy 2
- Economics 2
- Education 2
- Education, Elementary 2
-
12961
Podcasting as an Innovative Pedagogical Tool in Social Work Education
Published 2025-01-01“…In this article, the authors, both international podcasting social work academics, present an innovative framework for podcasting pedagogy and discuss co-production of podcasts as a form of teaching and learning co-design that is grounded in social work approaches to knowledge creation, dissemination, and scholarship.…”
Get full text
Article -
12962
Research of Fragment Mechanism Security in IPv6 Network Protocol
Published 2013-10-01“…Based on open source Snort platform,the packet block mechanism in IPv6 network was discussed.The behavior using IPv6 packet fragment to attack network was studied.Against to the problems,such as too little for IPv6 packet segment,overlapping section and so on,it put forward the corresponding countermeasures.The intrusion detection system were designed and implemented for piecewise leak testing.The experiments show that the design of intrusion detection system can detect the abnormal IPv6 packet,and Snort to support for IPv6 function was improved and optimized.…”
Get full text
Article -
12963
-
12964
Analisis Geometris Sistem Kendali Elevator Pesawat Udara N219
Published 2021-10-01“…The study of this analysis was using N219 airplane designed by PT. Dirgantara Indonesia. The preliminary design of the force that should be inputted by a pilot are in 495 kN.mm. …”
Get full text
Article -
12965
Oxygen Mass Transfer in an Aerated Stirred Tank with Double Impellers: A Generalized Correlation Including Spacing Impact
Published 2016-01-01“…The spacing between the impellers is considered to be a design factor of such industrial equipment due to its remarkable impact on the oxygen mass transfer.…”
Get full text
Article -
12966
Coordinated beamforming algorithm assisted by receive beamforming vector estimation
Published 2014-02-01“…By sharing a small amount of information among cooperated base stations(BSs), the proposed algorithm estimates the receive vectors of related users at the BSs based on MVDR criterion, which are then utilized to optimize the design of transmit beamforming vectors. The simula-tion results and analysis show that the proposed distributed scheme can achieve the performance close to that in the cen-tralized scheme with lower overhead and complexity. …”
Get full text
Article -
12967
DINAMIKA POLITIK PEMBANGUNAN PADA MASA ORDE BARU (Studi Tentang Industrialisasi Ketergantungan dan Peran Modal Jepang)
Published 2016-03-01“…Politic development Indonesia country at Orde Baru time to create industrialization hanging down, cause any problem can not to completion by Soeharto Politic rezim to manage development project/ industrialization, inter problem is economy domestic structure to colonial inheritance, so that industrial aspec, to be come problem at powerless exsistantion bourgeois class in domestic. Horizontal design from grouping in base culture for line (social stratification based on etnic line). …”
Get full text
Article -
12968
Research on the Architecture of Cold Chain Logistics Multimedia Monitoring and Tracking Service Platform Based on Fuzzy Sorting and Heuristic Algorithm
Published 2021-01-01“…Aiming at the features such as fragility of fruits and vegetables and high storage requirements, in this paper, a cold chain logistics multimedia monitoring and tracking service platform is built in an attempt to monitor the preservation environment and safety status of agricultural products relying on fuzzy sorting and heuristic algorithms, trace agricultural products with labels, and design the direction of the key data. The practice results show that the system is effective.…”
Get full text
Article -
12969
New cross-layer reputation mechanism for mobile cloud computing
Published 2018-03-01“…Users are facing increasingly serious security threats such as data leakage and privacy exposure while using various mobile cloud services.Based on the data security and privacy protection for mobile cloud computing research background,combining the cross-layer design and credit mechanism,in the node between the introduction of the MAC layer and network layer in the process of credit evaluation of factors affecting user reputation,to identify and manage internal malicious nodes.The credibility of the simulation results show that the proposed mechanism can effectively resist the internal defamation and multilayer attack,enhance the credibility of mobile terminals,thus improve the mobile cloud service data security and privacy protection.…”
Get full text
Article -
12970
Dynamics Simulation Analysis of the Slewing Gear Meshing of Anti-radiation Hydraulic Excavator
Published 2016-01-01“…The simulation results can provide the basis of the calculation for strength check and optimization design of slewing gear.…”
Get full text
Article -
12971
Dimensional Optimization of Spherical 5R Parallel Mechanism with Maximum Transmission Workspace
Published 2020-06-01“…The 2-degree-of-freedom spherical 5R parallel mechanism is taken as the research object, and teaching-learning-based optimization (TLBO) algorithm is applied to solve the optimization design problem of mechanism dimensional parameters. …”
Get full text
Article -
12972
Sensory Gardens
Published 2004-07-01“…In sensory gardens, plants and other design elements are selected with intention to provide experiences for seeing, smelling, hearing, touching, and tasting. …”
Get full text
Article -
12973
Calculation and Research of Transmission Efficiency of Gear with Addendum Modification based on Roll-off Angle
Published 2015-01-01“…Based on the power method,the roll-off angle is introduced to measure the position of meshing point,and the function relation formula between the modification coefficient and meshing efficiency is derived.The calculation formulation of modification coefficient of the maximum transmission efficiency is put forward through deriving the relation on the basis of extremism value principle for functions.Through the comparing with the experimental results of available literatures,can get to know that the numerical results of the calculation of modification coefficient and transmission efficiency are in good agreement with the experimental results of available literatures.A base for quantitative calculation of the initiative design of gear with addendum modification transmission efficiency is provided through the research work,and it has a certain reference value to the research and application for the gear with addendum modification.…”
Get full text
Article -
12974
Energy efficient beamforming scheme for wireless sensor networks
Published 2013-04-01“…Aiming at the limitation of energy and communication distance for nodes in wireless sensor networks and the characteristics of premature death due to ignoring the energy balance for traditional beamforming schemes,an energy efficient beamforming scheme was proposed.First the impact of the number of nodes,the transmission coefficients,the limited power,and the arrival phase on the network energy consumption is analyzed,and the corresponding design principles are given.Then,the nodes which participate the beamforming are selected based on these principles their transmission coefficients are adjusted according to their residual energy and phase.The analysis and simulation results show that the proposed scheme can effectively increase the number of successful transmission,balance the energy consumption among the nodes and prolong the network lifet me.…”
Get full text
Article -
12975
Numerical simulation of galvanized rebars pullout
Published 2014-12-01“…The usage of rebars in construction is the most common method for reinforcing plain concrete and thus bridging the tensile stresses along the concrete crack surfaces. Usually design codes for modelling the bond behaviour of rebars and concrete suggest a local bond stress – slip relationship that comprises distinct reinforcement mechanisms, such as adhesion, friction and mechanical anchorage. …”
Get full text
Article -
12976
Priority-based routing and wavelength assignment algorithm of multi-objective in WDM network
Published 2014-03-01“…An effective algorithm aiming at the multi-objective routing and wavelength assignment through priority in dynamic WDM optical network was proposed.The objective of the design is to maximize the number of accepted communication requests subjected to a limited number of wavelength channels.The relation between path type was adopted and the traffic volume was used to determine the priority of the connection requests,and the network state was incorporated into the routing decisions and wavelength assignment.The simulation results conclusively demonstrate that the proposed algorithm can greatly improve the blocking performance and utilization of the optical network resource.…”
Get full text
Article -
12977
Research on control plane technology for wide-area deterministic networking
Published 2023-11-01“…The efficient allocation of data elements is particularly important for achieving digital transformation in traditional industries.Network supply capabilities not only require low latency and high bandwidth for data packets, but also require low jitter and certainty in data packets.Deterministic networking technology is the key to build lossless, reliable, and deterministic wide-area communication capabilities.The key control technologies and design concepts for wide-area deterministic networking were proposed, and the specific plans for achieving deterministic networking perception, service planning, and traffic scheduling were elaborated on.Through experimental verification and application testing, the effectiveness of the system structure is proven and it meets the management and scheduling needs of deterministic networking.…”
Get full text
Article -
12978
Simple criterion for predicting fatigue life under combined bending and torsion loading
Published 2017-06-01“…Multiaxial fatigue is a challenging problem and, consequently, a number of methods has been developed to aid in design of components and assemblies. Following the complexity of the problem, these approaches are often elaborate and it is difficult to use them for simple loading cases. …”
Get full text
Article -
12979
RESEARCH ON STRESS AND STRENGTH OF WO-STAGE CYCLOID BALL PLANETARY TRANSMISSION
Published 2016-01-01“…This research provides important theory basis for the design application of the cycloid ball planetary transmission.…”
Get full text
Article -
12980
Network architecture with intrinsic security
Published 2019-09-01“…IP network brings big benefits for human’s life by connecting most devices all over the world,but its security and privacy issues make people frustrating when using end to end communication.Without intrinsic security design of the network,it is difficult for patch-like solutions to cure stubborn security issues (IP spoofing,privacy leakage,MITM attack,DDoS,etc.).On the basis of surveying different kinds of security threats and related security techniques,an overview of the security weakness analysis was given,and network architecture with intrinsic security (NAIS) was presented,including dynamic ID/IP with intrinsic security,security verification and audit protocols,and cross-domain cooperation defense mechanism,which could provide security and trustworthiness for end to end communication.…”
Get full text
Article