Showing 4,421 - 4,440 results of 12,255 for search '"Greats"', query time: 0.08s Refine Results
  1. 4421

    Study on the Nonlinear Vibration Characteristic of Bending-torsional Coupled Single-stage Gear by Rongju Liu, Fuzhong Chen, Yongjun Shi, Yongsheng Zhao

    Published 2019-09-01
    “…The stiffness of the follower gear bearing has a great influence on the vibration characteristics of the system.…”
    Get full text
    Article
  2. 4422

    Study on the Clutch Fuzzy Adaptive Control Technology of AMT during Start Process by Liu Ziyun, Liu Zijian, Pi Haojie, Ai Yandi, Zhou Jinchao

    Published 2016-01-01
    “…Aiming at the key issues of the clutch wear serious,the vehicle has great impact caused by clutch inaccurate control in the starting control of automatic mechanical transmission( AMT),taking the AMT clutch as the study object and reducing the impact degree and friction work as goal,a new kind of clutch engagement controlling strategy based on fuzzy control and self- adaptive control method is proposed. …”
    Get full text
    Article
  3. 4423

    Research Prospect of Anti-Jamming Strategy for the Satellite Internet by Chen HAN, Aijun LIU, Kang AN

    Published 2022-03-01
    “…As an important infrastructure of the national information system, the satellite internet is of great signifi cance to the national security.Thus, it needs to ensure the validity and reliability of the data transmission in the hostile jamming environment.The threat of smart jamming and the limitation of classical link-layer anti-jamming methods give rise to the new demand of intelligent and networked antijamming solutions.In view of the structural characteristics of the satellite internet and the development trend of modern communication jamming technologies, this paper analyzed the basic architecture of intelligent and networked anti-jamming.Based on the closed-loop strategic of sense-learn-prediction-decision-feedback, intelligent and active anti-jamming decision was made to realized self-confi guration and self-optimization.Based on the cooperative communication between nodes, networked anti-jamming ability was improved by the means of topology control and reconstruction, adjacent resources reallocation, and traffi c load balancing.It provided certain theoretical support for the construction of anti-jamming strategy system to achieved the cross-layer optimization, multi-domain combination, and adaptive intelligence.…”
    Get full text
    Article
  4. 4424

    Combined encryption method for CAN bus data based on periodic coupled processing by Wutao QIN, Peng WANG, Yufeng LI

    Published 2023-01-01
    “…In the intelligent connected age, CAN bus transmission faces the urgent demand of light weighted security encryption.Based on this, a fast response and high security CAN bus data encryption method was proposed.Since the 64 bit CAN packets were sent periodically, an online-offline block encryption algorithm coupled with message transmission cycle was proposed.In offline phase, the dynamic session key was generated by using advanced encryption standard.In online phase, the dynamic session key was used to quickly respond to encryption and decryption requests.The online computation delay was greatly reduced by the pre-encryption computation in offline phase, which helped achieving low latency and lightweight computation.At the same time, the ciphertext policy attribute based encryption was used to encrypt the block cipher.The access control policy made by the data sending OBU ensures that only the target OBU can decrypt the block cipher, so as to achieve targeted encryption.…”
    Get full text
    Article
  5. 4425

    Dynamics Analysis and Intermittent Energy Feedback Control of m-HR Neuron Model under Electromagnetic Induction by Jiankui Peng, Suoping Li

    Published 2022-01-01
    “…It is of great practical significance to fully reveal the global discharge characteristics of neurons in electromagnetic environment and design effective energy feedback strategy for accurate prediction of neural information. …”
    Get full text
    Article
  6. 4426

    „Ven z pasivity!“ Český konzervativní velkostatek na začátku první světové války by Šárka Lellková

    Published 2007-01-01
    “… At the beginning of the First World War conflicts occurred inside the Party of Bohemian Conservative Great Landowners. They became apparent in the arguments about keynote addresses and newspaper articles. …”
    Get full text
    Article
  7. 4427

    DA draws a circle: on document architecture and its relation to library and information science education and research by Mats Dahlstrom, Mikael Gunnarsson

    Published 2000-01-01
    “…The mismatch of traditional library institutions and systems (where the printed codex book and its derivatives have been the standard of measurement) and digital carriers for bodies of text and the different architectures of these, suggests our great need for new fields of LIS research, where DA might prove a valuable tool. …”
    Get full text
    Article
  8. 4428

    RESEARCH OF THE QUANTITATIVE RELATIONSHIP BETWEEN THE STRESS AND MAGNETIC OF Q235B ROUND HOLE SPECIMEN by ZHANG Ying, GAO Han, ZHANG ShengYu, LI Bin

    Published 2015-01-01
    “…As the test specimens reached the specimen tensile strength,three kinds of pore size specimens take on the phenomenon that normal component value has greatly increased and the normal component of the gradient has suddenly changed in the local peak stress. …”
    Get full text
    Article
  9. 4429

    Promoting music intervention training in oncology in China: Challenges, opportunities, and pathways forward by Nie Juan, He Ying-Lan

    Published 2024-01-01
    “…Although health professionals show great interest in implementing this emerging intervention, they often lack the foundational knowledge and essential skills, which diminishes its effectiveness. …”
    Get full text
    Article
  10. 4430

    Image encryption method based on multiple-order fractional discrete Tchebichef transform and generating sequence by Bin XIAO, Wenming SHI, Weisheng LI, Jianfeng MA

    Published 2018-05-01
    “…Fractional transform based image encryption methods have been widely studied in recent years.However,most of the existing fractional transform based image encryption methods are defined in the complex field.Thus,the encrypted images contain both phase and amplitude information,which is not conducive to transmission and storage.Moreover,some encryption methods that meet the requirements of reality-preserving have problems of relatively single keys,lacking of sensitivity and so on.An image encryption method was proposed based on multiple-order fractional discrete Tchebichef transform and generating sequence.The proposed method used randomly generated row and column vectors and generating sequence generated by Chaotic sequences as keys to encrypt images,which not only satisfied property of reality-preserving transmission but also greatly expanded the key space.The experimental results further demonstrate that the proposed encryption method can resist a variety of attacks,and decrypted images are almost non-distored,which indicate excellent encryption effect,sufficient security and robustness of the method.…”
    Get full text
    Article
  11. 4431
  12. 4432

    Wake Behavior behind Turbine Cascades in Compressible Two-Dimensional Flows by Rainer Kurz

    Published 2005-01-01
    “…In compressible turbine flows, the influence of the inviscid flow field is of great importance. In this paper, an approach to take this influence into account when determining the behavior of the wake is presented. …”
    Get full text
    Article
  13. 4433

    State-of-the-art and trend of emergency rescue communication technologies for coal mine by Qingsong HU, Wei YANG, Enjie DING, Shiyin LI, Binghao LI

    Published 2019-05-01
    “…For the disaster area probing and emergency rescue in a mine,it is of great importance to employ the emergency communication system to communicate with each other,determine the places of trapped miners,and sense current status of disaster area.The hybrid emergency communication architecture model for coal mines was extracted,which was composed of one backbone,multiple branches,several special lines,and some wireless networks as assistance.Four types of emergency communication systems of coal mine were reviewed,namely through-the-air,through-the-wire,through-the-earth and mixed medium type.The key technologies and challenges of these four emergency communication types were analyzed.The research trend was discussed and a new emergency communication mode based on the reconstruction of mine Internet of things was proposed.The main enabling technologies of this new emergency communication mode were analyzed,namely post-disaster reconstruction of mine Internet of things,shifting nodes re-localization after mine disaster,status sensing method of mine disaster area,and data transmission method for post-disaster reconstruction network.…”
    Get full text
    Article
  14. 4434

    The Medieval Muslim Cemeteries of Tigray (Ethiopia) by Simon Dorso, Anna Lagaron

    Published 2023-07-01
    “…The data collected in Bilet, important for the knowledge of Ethiopian Islam before the great conquests of the sixteenth century, can now be compared locally to the unpublished corpus of contemporary cemeteries identified in the vicinity of Arra, which delivered important epigraphic material but were not excavated. …”
    Get full text
    Article
  15. 4435

    Study Questions for the Certified Pesticide Applicator Examination: Natural Areas Weed Management by Ken A. Langeland

    Published 2005-08-01
    “…Answers to all questions can be found in these publications. You will greatly improve your ability to achieve a passing examination score by locating the answers to the study questions and writing them down. …”
    Get full text
    Article
  16. 4436

    The variety and limits of dairy policies in a context of global market deregulation by Daniel-Mercier Gouin, Aurélie Trouvé

    Published 2020-12-01
    “…Based on the dairy sector, this analysis supports the idea of a great diversity of national forms of state and regulation, adapting to the global capitalist and neo-liberal regime. …”
    Get full text
    Article
  17. 4437

    Deconstructing esports by Tom Legierse, Maria Ruotsalainen

    Published 2024-12-01
    “…Branding competitive gaming as esports, part of a process known as sportification, has contributed greatly to the wider acceptance of competitive gaming as legitimate leisure and professional activity. …”
    Get full text
    Article
  18. 4438

    Developing ethical formation through literature and philosophy in school by Lisa Rygaard Frost Kristensen

    Published 2024-12-01
    “…Thus, literature offers a unique window of experiences that has great potential for the philosophical classroom. …”
    Get full text
    Article
  19. 4439
  20. 4440

    Research on PAPR reduction algorithm based on CWGAN-SLM for multi-wavelet OFDM system by Guang YANG, Zhaoyang WU, Min NIE, Xiaohong YAN, Fan JIANG

    Published 2023-04-01
    “…In order to meet the demand for low peak to average ratio (PAPR) of orthogonal frequency division multiplexing (OFDM) technology in the future 6G satellite-ground integrated system, an algorithm combining selective mapping (SLM) algorithm and multi-wavelet OFDM technology was proposed firstly.However, the PAPR reduction was limited and the computational complexity was high.To solve this problem, a multi-wavelet OFDM PAPR reduction algorithm based on conditional Wasserstein generative adversarial network (CWGAN) and SLM was proposed, which was called CWGAN-SLM algorithm.CWGAN was introduced to generate more time-domain alternative signals to reduce the PAPR in the CWGAN-SLM algorithm.Simulation results indicate that the CWGAN-SLM algorithm greatly reduces the PAPR of the system and the computational complexity, and has a lower bit error rate.Compared with the GAN and WGAN, the CWGAN has the advantages of easy training, strong stability and good PAPR performance.…”
    Get full text
    Article