Showing 11,661 - 11,680 results of 63,767 for search '"TIME"', query time: 0.18s Refine Results
  1. 11661

    Cause Analysis and Control Measures of Waterlogging in Shanghai Zoo Based on MIKE 21 by ZHOU Jing, WANG Huan

    Published 2023-01-01
    “…In order to analyze the cause of waterlogging after the drainage system of Shanghai Zoo reached the standard and explore the best control measures,data analysis and field investigation were carried out,and it was preliminarily determined that the waterlogging in the zoo was related to the poor drainage of the water system and the insufficient drainage pumping station.MIKE 21 was used to build a hydrodynamic model of the water system in the zoo,and the changes in the hydrological characteristic values of the water system under the current drainage condition were simulated and studied.It is concluded that the root cause of waterlogging in the zoo is that the drainage path is blocked,and the drainage pumping station has an insufficient scale and unreasonable layout.In order to promote drainage and remove waterlogging,the water system optimization and waterlogging facility renovation plans were proposed,and the engineering effect of each plan was simulated.Through the comparison of indicators such as drainage rate,drainage time,and maximum drainage time difference in different regions,the effect of each plan in promoting drainage and removing waterlogging was determined.In view of the engineering economy,the plan of expanding culverts and moving some culverts to the river was determined as the best,and the drainage layout was adjusted to achieve the best control effect under the specific investment.…”
    Get full text
    Article
  2. 11662

    Computer Vision-Based Structural Displacement Monitoring and Modal Identification with Subpixel Localization Refinement by Tao Liu, Yu Lei, Yibing Mao

    Published 2022-01-01
    “…Therefore, the developed CV-based methods can obtain accurate displacement results in both time and frequency domains, which could be applied to complex structures with more monitoring targets.…”
    Get full text
    Article
  3. 11663

    FPGA multi-unit parallel optimization and implementation of post-quantum cryptography CRYSTALS-Kyber by Bin LI, Xiaojie CHEN, Feng FENG, Qinglei ZHOU

    Published 2022-02-01
    “…In lattice-based post-quantum cryptography, polynomial multiplication is complicated and time-consuming.In order to improve the computational efficiency of lattice cryptography in practical applications, an FPGA multi-unit parallel optimization and implementation of post-quantum cryptography CRYSTALS-Kyber was proposed.Firstly, the flow of Kyber algorithm was described and the execution of NTT, INTT and CWM were analyzed.Secondly, the overall structure of FPGA was given, the butterfly arithmetic unit was designed by pipeline technology, and the Barrett modulus reduction and CWM scheduling optimization were used to improve the calculation efficiency.At the same time, 32 butterfly arithmetic units were executed in parallel, which shortens the overall calculation cycle.Finally, the multi-RAM channel was optimized to improve the memory access efficiency with alternate data access control and RAM resource reuse.In addition, with the loosely coupled architecture, the overall operation scheduling was realized by DMA communication.The experimental results and analysis show that the proposed scheme implemented can complete NTT, INTT and CWM operations within 44, 49, and 163 clock cycles, which is superior to other schemes and has high energy efficiency ratio.…”
    Get full text
    Article
  4. 11664

    PHUBBING BEHAVIOR IN THE QUR’AN: A THEMATIC STUDY OF THE OPINIONS OF INDONESIAN MUFASSIR by Alisa Aura Zanuba, Musolli Musolli

    Published 2023-12-01
    “…The results of this research include: 1) Patterns of phubbing individuals spending time on games and addictive behaviors on gadgets. 2) Explanations about communication ethics in the Qur’an, where phubbing behavior can damage the quality of communication for individuals and their conversation partners. 3) Phubbing behavior can diminish the quality of time. …”
    Get full text
    Article
  5. 11665

    xStripeMerge: efficient wide stripe generation approach based on erasure coding storage by Meiguang ZHENG, Taofei HUA, Xinyu ZHANG, Zhigang HU

    Published 2023-11-01
    “…To address the issue of wide stripe generation in existing erasure coding storage systems, where storage scaling approaches resulted in a significant increase in wide stripe generation bandwidth and stripe merge scheme was constrained by dual-stripes, an efficient wide stripe generation approach was proposed for the wide stripe generation problem under multi stripes merging.Two key operators for the multi-stripes merging progress were defined, and the wide stripe generation problem was modeled as a combinatorial optimization problem.The efficient wide stripe generation approach xStripeMerge was proposed that prioritize the search for narrow-stripes combining schemes with small parity block transmission costs.Experimental results show that xStripeMerge can reduce the wide stripe generation bandwidth by 75% compared to the advanced storage scaling method.The time and space complexity of xStripeMerge is much better than that of the extended dual-stripes merge approach.xStripeMerge can get the wide stripe generation scheme with similar performance in a shorter period of time and it is also suitable for large-scale storage systems.…”
    Get full text
    Article
  6. 11666

    RECOGNITION METHOD OF METAL FRACTURE IMAGES BASED ON GROUPLET TRANSFORM AND KERNEL PRINCIPAL COMPONENT ANALYSIS by LI ZhiNong, CHEN Kang, YAN JingWen, YANG YanChun

    Published 2016-01-01
    “…This wavelet can be transformed at any time and space,and adaptively change the basis according to image texture. …”
    Get full text
    Article
  7. 11667

    Photocatalytic Degradation of Methylene Blue by Fe/ZnO/SiO2 Nanoparticles under Visiblelight by R. M. Mohamed, I. A. Mkhalid, E. S. Baeissa, M. A. Al-Rayyani

    Published 2012-01-01
    “…The effect of pH, illumination time, amount of catalyst loaded, and initial dye concentration on the degradation efficiency of methylene blue was investigated. …”
    Get full text
    Article
  8. 11668

    Research on the Adaptive Damping Method of Strap-Down Inertial Measurement Unit Based on the Magneto Rheological Technology by Heng Zhang, Xiaoting Rui, Fufeng Yang, Gangli Chen

    Published 2017-01-01
    “…Results of experiments show that the method solves the problem that the stiffness and damping of the SIMU damping system could not be changed in real time to adapt to the dynamic environment, and there is almost no time delay and this has an obvious damping effect.…”
    Get full text
    Article
  9. 11669

    Stayed-Cable Bridge Damage Detection and Localization Based on Accelerometer Health Monitoring Measurements by Mosbeh R. Kaloop, Jong Wan Hu

    Published 2015-01-01
    “…The statistical and model identification time series, the response spectra, and the power density of the frequency domain are used to detect the behavior of Yonghe cable-stayed bridge during the healthy and damage states. …”
    Get full text
    Article
  10. 11670

    Enhancing Quality of Service in Software-Defined Internet of Things (SD-IoT) Environment: A review by Grif Abdelali, Zyane Abdellah

    Published 2024-01-01
    “…The Internet of Things (IoT) connects billions of devices via the Internet, providing real-time intelligent services. Software-Defined Networking (SDN) represents an advanced solution for managing traffic and resources in these IoT environments, enabling centralized and flexible management through the separation of control and data. …”
    Get full text
    Article
  11. 11671

    The Study of Mean-Variance Risky Asset Management with State-Dependent Risk Aversion under Regime Switching Market by Shuang Li, Yu Yang, Yanli Zhou, Yonghong Wu, Xiangyu Ge

    Published 2021-01-01
    “…It has been derived closed-form analytical expressions applied in the time-inconsistent investment with optimal control theory to see that happens to the optimal value of the function. …”
    Get full text
    Article
  12. 11672

    Synodality as a return to the origins of Christianity and the way of building the God’s Kingdom by Sebastian Zygmunt

    Published 2020-12-01
    “…The extreme understanding the Pope’s role as an absolute monarch who independently decides about all dimensions of the Church has supplanted with time the known from the Apostle’s time communal management of the Mystical body of Christ. …”
    Get full text
    Article
  13. 11673

    Bronze spoked wheels from Sanxingdui and ancient indian myths about Garuda by Varenov Andrey V.

    Published 2024-12-01
    “…He suggests calling the smaller sculptures, cast at one time, “statuettes” . The design features of bronze anthropomorphic statues of Sanxingdui allow us to synchronize the time of their creation with the existence of bronze masks of types A and C, as well as bronze “spirit trees” No. 2 and No. 1, since the same technological methods were used in their production. …”
    Get full text
    Article
  14. 11674

    Improved Measurement Accuracy Based on Moving Sine-Wave Fitting for Ultrasonic Ranging by Xuanze Wang, Aihui Wang, Jinping Yin, Hang Zhao, Zhengqiong Dong, Yiyan Fan, Zhongsheng Zhai

    Published 2022-01-01
    “…In ultrasonic ranging system, the time-of-flight (TOF), which acquired by the determination of two special points of ultrasonic echo, is important for accuracy and speed. …”
    Get full text
    Article
  15. 11675

    Resource Efficient Hardware Architecture for Fast Computation of Running Max/Min Filters by Cesar Torres-Huitzil

    Published 2013-01-01
    “…Faster computations can be achieved by kernel decomposition and using constant time one-dimensional algorithms on custom hardware. …”
    Get full text
    Article
  16. 11676

    Multi-Tier Blockchain-Based Land Registry Using Fog Computing by Ashank Priyadarshi, Thankaraja Raja Sree

    Published 2025-01-01
    “…The conventional method of selling and purchasing land has several drawbacks because it requires a lot of time, a lengthy verification procedure, and prolonged final processing. …”
    Get full text
    Article
  17. 11677

    Ikere-Ekiti in Art and Cultural Narratives by dele jegede

    Published 2021-12-01
    “…But it is the annual celebration of the Olosunta festival that serves as the rallying point for the indigenes of the city at the same time that it provides a time-honored structure for handling potentially explosive cultural and political contestations. …”
    Get full text
    Article
  18. 11678

    Studies of biodiesel production using various blends of waste palm cooking oil and castor oil by Rao Geevitha Anantha, Krishnan Soundarajan

    Published 2025-01-01
    “….%), molar ratios of methanol: oil, catalyst concentrations (wt.%), reaction time, reaction temperature and various co-solvents have been investigated to determine the optimal conditions for transesterification reaction. …”
    Get full text
    Article
  19. 11679

    DDoS attack detection and defense based on hybrid deep learning model in SDN by Chuanhuang LI, Yan WU, Zhengzhe QIAN, Zhengjun SUN, Weiming WANG

    Published 2018-07-01
    “…Software defined network (SDN) is a new kind of network technology,and the security problems are the hot topics in SDN field,such as SDN control channel security,forged service deployment and external distributed denial of service (DDoS) attacks.Aiming at DDoS attack problem of security in SDN,a DDoS attack detection method called DCNN-DSAE based on deep learning hybrid model in SDN was proposed.In this method,when a deep learning model was constructed,the input feature included 21 different types of fields extracted from the data plane and 5 extra self-designed features of distinguishing flow types.The experimental results show that the method has high accuracy,it’s better than the traditional support vector machine (SVM) and deep neural network (DNN) and other machine learning methods.At the same time,the proposed method can also shorten the processing time of classification detection.The detection model is deployed in SDN controller,and the new security policy is sent to the OpenFlow switch to achieve the defense against specific DDoS attack.…”
    Get full text
    Article
  20. 11680

    Dynamic cache allocation routing strategy of Internet of things satellite node based on traffic prediction by Weidong WANG, Cheng WANG, Huiwen WANG, Pin XU

    Published 2020-02-01
    “…Aiming at the routing problem of low earth orbit (LEO) Internet of things (IoT) satellite systems,a dynamic cache allocation routing strategy based on traffic prediction for IoT satellite nodes was proposed.Firstly,the space-time characteristics of traffic distribution in the LEO coverage area were analyzed,and an end-to-end traffic prediction model was proposed.Then,according to the traffic prediction result,a dynamic cache allocation routing strategy was proposed.The satellite node periodically monitored the traffic load of the inter-satellite link,dynamically allocated the cache resources of each inter-satellite link between the neighboring nodes.The cache allocation process was divided into two phases,initialization and system operation.At the same time,the traffic offload and packet forwarding strategy when the node was congested was proposed.By comparing the queuing delay and the forwarding delay,it was determined whether the data packet needs to be rerouted.The simulation results show that the proposed routing strategy effectively reduces the packet loss rate and average end-to-end delay,and improves the traffic distribution in the whole network.…”
    Get full text
    Article