Showing 14,141 - 14,160 results of 46,768 for search '"Design"', query time: 0.13s Refine Results
  1. 14141

    Broad Learning-Based Optimization and Prediction of Questionnaire Survey: Application to Mind Status of College Students by Lin Yu, Shejiao Ding

    Published 2018-01-01
    “…Firstly, the questionnaire related to the ideological state is designed. Secondly, the data are collected and classified using the typical questions and answers. …”
    Get full text
    Article
  2. 14142

    Aller au cinéma pour apprendre à être « moderne » ? by Anne Kerlan

    Published 2012-04-01
    “…Movie at its beginnings in China took over many places traditionally dedicated to Chinese culture (teahouse, gardens, theater and opera houses); however, it became very quickly obvious that movie screenings should be held in places that could mirror the novelty of the show, either by the architecture, the design of the room or by the etiquette. This was particularly true for theaters where western films were screened: going to see such films could be conceived as a global experience, a way to learn in all aspects the western modernity carried by these products. …”
    Get full text
    Article
  3. 14143

    Analysis on Cable Fault Tolerance Kinematics Space of Cable-driven Snake-arm Robots by Chen Huiqing, Yang Taiwei

    Published 2024-08-01
    “…The results not only reveal the influence of different arm segments on the reachable space of snake-arm robots, but also lay a foundation for the arm segments structure design optimization and the intelligent trajectory planning of the cable-driven snake-arm.…”
    Get full text
    Article
  4. 14144

    Le discours auto-adressé des sujets malades chroniques : un agir sur soi by Lennize Pereira Paulo

    Published 2017-06-01
    “…This qualitative study tries to identify ways and process used by the subjects affected by chronic disease to design or transform their daily life activities. Based on fourteen qualitative interviews this article postulates that self-directed speech can be considered as a category of instrument (Vygotski) used by the subject to stay alive, bearing in mind that people living with a chronic disease are required to perform specific activities to stay alive and healthy (Tourette-Turgis). …”
    Get full text
    Article
  5. 14145

    An efficient routing and cache management algorithm based on interest-community for opportunity networks by Zhi REN, Kunlong WANG, Xiufeng LI

    Published 2018-06-01
    “…Aiming at the problem of control message redundancy existing in BEEINFO algorithm,unconsidered node multi-neighbor message forwarding problem and unreasonable management of message in cache,an efficient routing and cache management algorithm named ERCMAON which based on community of interest was proposed.The message forwarding delay was reduced by streamlining control messages,increasing the route design for multiple-neighbor nodes.At the same time,by optimizing the node cache management mechanism,the probability of deleting useful information was reduced,which could improve the success rate of message delivery.Simulation results show thatcompared with the BEEINFO algorithm,the delivery success rate of ERCMAON algorithm increases by at least 2.0%,the data delivery overhead and the normalized control overhead reduces by at least 9.7% and 1.7% respectively.At the same time,the message transmission delay reduces at least 2.4%.…”
    Get full text
    Article
  6. 14146

    INTERVAL ANALYSIS METHOD OF RELIABILITY PREDICTION ON AUTOMOTIVE BRAKE SYSTEM AND TIRE by JIA AiQin, WEI YongQiang, JIANG ZhiQiang

    Published 2015-01-01
    “…The calculation results show that this method is effective and feasible, which provide a reference design for improvement and the adjustment of automotive brake system and tire.…”
    Get full text
    Article
  7. 14147

    An efficient method to generate elliptic curves by ZHOU Chang-ying1, Kwok-Yan-Lam1, ZHOU Zheng-ou2

    Published 2001-01-01
    “…Hence, the number of elliptic curves suitable for use by public key cryptosystems is increased greatly. We design a method to implement such a scheme, showing that, it is much faster to generate a suitable elliptic curve with this new scheme than with the original scheme.…”
    Get full text
    Article
  8. 14148

    A survey of optical/electric hybrid switching technology for satellite Internet by Zhenhua ZHANG, Siyue SUN, Gaosai LIU, Long WANG, Xinglong JIANG, Lin DONG, Guang LIANG

    Published 2022-11-01
    “…In the space environment where laser links and microwave links coexist, the development of satellite Internet optical/electric hybrid switching will help promoting the construction of air-space-ground integration.According to the characteristics and transmission requirements of satellite Internet services, the current status of electrical domain switching technology and optical domain switching technology were investigated and analyzed, and the applicability of existing switching technologies in the construction of satellite Internet was summarized.At the same time, according to the analysis results, the end-to-end network on the satellite was constructed, and based on this, the design of the optical/electric hybrid switching architecture on the satellite was completed.It mainly included the interface, electrical domain adaptation module, optical domain adaptation module, optical/electric convergence module, optical switching module, packet switching module and management control module.…”
    Get full text
    Article
  9. 14149

    Blockchain and credibility function based chain storage method of electronic encrypted information by Ting ZHOU

    Published 2023-07-01
    “…To optimize the proportion of encrypted information storage space in the blockchain and improve the speed of online storage, a design method for electronic encrypted information online storage based on blockchain and credibility function was proposed.An information encryption classification model based on blockchain and credibility function was established, and a traceability voucher judgment function was obtained.Proxy re-encryption was performed on electronic information.The storage capacity of the cluster was calculated, and encrypted ciphertext was used to directly match the access structure tree.Subject credibility and object credibility were distinguished, electronic encrypted information was classified based on the credibility function, and an electronic encrypted information uplink storage method was designed.The experimental results show that after applying the proposed method, when the number of files is between 1 000 and 10 000, the data storage speed is the fastest, and the storage space proportion and storage speed are greatly optimized.…”
    Get full text
    Article
  10. 14150

    Internet source address verification method based on synchronization and dynamic filtering in address domain by Dan LI, Lancheng QIN, Jianping WU, Yingying SU, Mingwei XU, Xingang SHI, Yunan GU, Tao LIN

    Published 2020-10-01
    “…At the beginning of the design of the Internet architecture,it assumed that all network members were trusted,and did not fully consider the security threat brought by the untrusted network members.For a long time,routers only forward packets based on the destination IP address of the packet,and do not carry out any verification on the source IP address of the packet.The lack of packet level authenticity on the Internet results in the header being maliciously altered.A real source address verification mechanism with routing synchronization and dynamic filtering were proposed.This mechanism constructs the filter table based on the prefix-topology mapping synchronization,the problem of inconsistent state between the filter table and the route caused by routing asymmetry were solved,false positives and false negatives was avoided,and a low-overhead and low-latency source address verification of the IP address prefix level granularity in the address domain were realized.…”
    Get full text
    Article
  11. 14151

    Optimizing of Transmission Gear Ratio based on Cruise-Isight Co-simulation by Ai Xiaochen, Zheng Guangyong, Zhang Shoufeng, Zeng Hao

    Published 2018-01-01
    “…By using multi-island genetic algorithm,the transmission gear ratio is optimized separately under certain traction ability and structural design constraints,a basic optimized scheme which can meets performance target is gotten. …”
    Get full text
    Article
  12. 14152

    Compact Multiband Interdigital-Coupled-Fed Planar Antenna with Stepped-Impedance Structures for Mobile Handsets by Tao Zhou, Yazi Cao, Zhiqun Cheng

    Published 2017-01-01
    “…Details of the antenna design and experimental results are presented and discussed.…”
    Get full text
    Article
  13. 14153
  14. 14154

    Study on the Analyzing and Simulating Method of Workspace of Force Reflecting Main Manipulator by Qu Jinxing, Feng Feng

    Published 2016-01-01
    “…As a crucial kinematics index for main manipulator performance,the workspace needs to be considered in design,control and application,it represents the main manipulator action range,and the working performance of main manipulator is discussed from the aspects of geometry. …”
    Get full text
    Article
  15. 14155

    Synthesis of symmetric paths of arbiter physically unclonable function on FPGA by A. A. Ivaniuk

    Published 2019-06-01
    “…Physical cryptography is one of the current trends among the existing methods of protecting digital devices from illegal access. Circuit design solutions in physical cryptography are called digital physically unclonable functions (PUFs), which to be implemented ensure the uniqueness, non-reproducibility (non-cloning) of the protected digital device. …”
    Get full text
    Article
  16. 14156

    Silencing Mechanisms in Academia: Towards Collaborative Innovation to Support Critical Social Science by Mustafa F. Özbilgin, Cihat Erbil

    Published 2024-12-01
    “…Theorising collaborative innovation, we offer multilevel and inclusive design and solidarity as possible venues for resistance against the ongoing purge of CSS, which undermines autonomy, freedom of speech, and equality in academia.…”
    Get full text
    Article
  17. 14157

    RESEARCH AND APPLICATION ON THE HIGH SPEED CAM MECHANISM WITH CLEARANCE ON ACCOUNT OF MULTI-OBJECTIVE OPTIMIZATION by HE XueMing, CHEN XiaoFei, WU MeiPing, ZHANG Rong, JI XiaoGang

    Published 2019-01-01
    “…For high-speed CAM with clearance in the process of running with reduced stability and increasing noise and wear and so on and on the basis of the characteristics of structure dynamics and kinematics, a kind of high speed CAM mechanism with clearance based on kinematics and dynamics multiple targets was put forward for optimization design. Optimization results show that we can find that the optimized CAM curves improve overall performance and part of the performance curves approach or exceed high-speed CAM common cycloid CAM curve when the three coefficients polynomial CAM curves and the standard CAM curve are compared. …”
    Get full text
    Article
  18. 14158

    À propos de quelques outils de collecte de données : réflexions sur les pratiques numériques en archéologie by Christophe Tufféry, Vincent Delvigne, Paul Fernandes, Céline Bressy-Léandri

    Published 2021-05-01
    “…During the implementation of these tools, methodological and epistemological questions arose. They concern the design and implementation of such devices for researchers from heterogeneous disciplinary horizons (archaeology, prehistory, geography, petrography, mineralogy, geochemistry, etc.); their practices are modified, to a variable extent, by the conditions and contexts in which these digital devices are implemented.…”
    Get full text
    Article
  19. 14159

    L’alternative monétaire Bitcoin : une perspective institutionnaliste by Odile Lakomski-Laguerre, Ludovic Desmedt

    Published 2015-12-01
    “…In general, crypto-currencies are challenging the traditional design of the currency as a unitary, territorialized and centralized system. …”
    Get full text
    Article
  20. 14160

    Congestion control algorithm for unreliable unicast traffic by SONG Li-hua1, CHEN Ming1, WANG Hai-tao2, XIONG Huan1

    Published 2008-01-01
    “…It combines loss and delay signals, and made several special design choices to avoid rate control’s inherent weakness. …”
    Get full text
    Article