Suggested Topics within your search.
Suggested Topics within your search.
- Design 10
- Design and construction 10
- Research 7
- Methodology 6
- Web sites 6
- Dressmaking 4
- History 4
- Management 4
- Study and teaching 4
- Computer networks 3
- Computer-aided design 3
- Economic development 3
- Evaluation research (Social action programs) 3
- Human-computer interaction 3
- Moral and ethical aspects 3
- Pattern design 3
- Visual communication 3
- methods 3
- Advertising 2
- Application software 2
- Commercial art 2
- Computer animation 2
- Computer programs 2
- Computer-assisted instruction 2
- Curricula 2
- Curriculum planning 2
- Economic policy 2
- Economics 2
- Education 2
- Education, Elementary 2
-
10421
Dynamic Response Analysis of Gearbox Housing Under the Multi- source Dynamic Excitation
Published 2015-01-01“…The results show that,the overall design is more conservative relatively,but the middle of the plate- type parts have large deformation,smaller stiffness and need to focus on early in the design.…”
Get full text
Article -
10422
Algorithm of blockchain data provenance based on ABE
Published 2019-11-01“…To solve the problem that the blockchain-based traceability algorithm mainly used homomorphic encryption and zero-knowledge proof for privacy protection,making it difficult to achieve dynamic sharing of traceability information,a blockchain data traceability algorithm based on attribute encryption was proposed.In order to realize the dynamic protection of transaction privacy,the strategy update algorithm applicable to block chain was designed based on the CP-ABE scheme proposed by Waters to achieve dynamic protection of transaction privacy.In order to realize the dynamic update of the visibility about block content,based on the strategy update algorithm,the block structure was designed to achieve the dynamic update about the content visibility of the block.The security and experimental simulation analysis show that the proposed algorithm can realize the dynamic sharing of traceability information while completing the protection transaction privacy.…”
Get full text
Article -
10423
Architecture of a new infrastructure for data service in DT era
Published 2022-07-01“…Data technology (DT) era centered on the data technology and data service was coming.To handle the major challenges in the data exchange and transactions, a new infrastructure - data sharing service network (DSSN) was proposed, which provided the data interconnection, exchange, transactions, supervision and other services for regulators, data providers, data applications and technical support providers.The design principles of DSSN system were outlined as compliance, security, fairness, openness and connection service.And the architecture of DSSN system was designed according to the principles.A layered architecture was applied to the data sharing service node with the service control layer and service capability layer.The data node was composed of the data sharing dedicated server and data source, and was connected to DSSN through data gateway.…”
Get full text
Article -
10424
VM migration across subnets in future internet architecture—XIA
Published 2016-03-01“…When a VM migrates among hosts residing in two IP subnets,the network attachment point of VM changed,which causes the IP mobility problem.It was meaningful to design and evaluate VM migration performance under the future internet architecture.XIA (expressive Internet architecture)was focused,a novel future internet architecture,sup-port for VM live migration.Motivated by the natural f res of ID/location decoupling,versatile routing with DAG (di-rected acyclic graphs) in XIA,The design and implementation of rendezvous agent based migration (RABM) approach was given.In demonstrate that XIA supported VM migration can achieve fast network re-connection between VM and correspondent node,while keeping the network control plane simplicity and data plane efficiency.…”
Get full text
Article -
10425
Warunki do zabawy na Przygodowym Placu Zabaw w Berkeley Marina w Kalifornii
Published 2017-05-01“…At the same time the it was designed in the way that encourages to play not only children’s but also adults. …”
Get full text
Article -
10426
Variational Iteration Method of Dropping Shock Response for the Suspension Spring Packaging System
Published 2015-01-01“…Conditions for resonance were obtained by applying the variational iteration method, which should be avoided in the packaging design. The results provide reference for suspension spring system design.…”
Get full text
Article -
10427
Study and implementation of electric cloud storage pool’s management system
Published 2018-04-01“…The storage pool is an important part of the resource pool and plays an important role in data storage and data backup.The storage pool has the characteristics of large scale,prominent isomerism,and complex functions.The storage pool management system of the storage pool guarantees the normal work of the storage pool.Based on the design of the storage pool architecture,the functional framework of the storage pool was clarified,and the deployment structure of the storage pool management system and the overall architecture of the storage pool management system was proposed and designed,and the implementation functions and display form of the management system were elaborated in detail.The research and implementation of the storage pool management system not only promoted the construction of the power cloud resource pool,but also provided a good reference for other companies’ cloud computing technology.…”
Get full text
Article -
10428
Kinematics Analysis and Simulation of the Cement Truck Loading Manipulator
Published 2015-01-01“…Aiming at the practical needs of the cement loading industry,a kind of bagged cement automatic loading machine is developed and designed. Besides a truck loading manipulator with the characteristic simple structure,fewer driving parts,easy to control is presented. …”
Get full text
Article -
10429
Building with Plastic. A New Possible Solution for the Environment
Published 2019-06-01“…Models of different constructive solutions have been designed and built, up to the proposal of a module of four bottles, filled with sand and tied together. …”
Get full text
Article -
10430
Preparation and Application of Novel Power Semiconductor Chips
Published 2024-01-01“…This study aims to improve the triggering current and dynamic characteristics of thyristor chips by designing new gate structures and multilayer semiconductor structures. …”
Get full text
Article -
10431
NC Machining Simulation and Virtual Measurement of Spiral Bevel Gear based on the VERICUT
Published 2015-01-01“…The NC machining simulation and virtual measurement of spiral bevel gear is carried out based on the VERICUT.Firstly,the coordinate transformation principle of traditional machine and NC machining principle are introduced.Then the tooth cutting simulations of the large gear of spiral bevel gear are carried out by using VERICUT.Secondly,the three-dimensional model is reversely built by means of UG software and the generated coordinates of tooth surface points.Finally,the simulation tooth cutting model is measured and contrasted with UG design model to verify the feasibility of NC processing method.Meanwhile,it also offers shortcuts to the actual NC machining of the gear,and greatly shortens the cycle from design to production,thus improving the production efficiency of spiral bevel gear.…”
Get full text
Article -
10432
Video content identification scheme in content oriented network environment
Published 2018-06-01“…Video fingerprinting technology is a video identification technology proposed for the identification of massive video data.Firstly,the research status of the content network and the main problems that exist were elaborated,especially the problems of content identification.Then design principles of the video content identification scheme were proposed from the video content identification requirements in the content network,and the principles and disadvantages of the existing solutions were analyzed in depth.Finally,a video content identification scheme based on video fingerprinting technology was designed and implemented after analyzing the concept and principle of video fingerprinting technology.The feature was:the two types of video fingerprinting technology in the time domain and frequency domain were integrated.While shortening the time for generating video tags,it also improved the robustness of the overall system.…”
Get full text
Article -
10433
Future IP network architecture evolution for service and network collaboration
Published 2021-10-01“…As the technical foundation of the internet, how IP technology develops in the next 5 to 10 years is the key issue facing the communication industry.The success and weakness of the traditional IP network architecture were analyzed, and the future IP network should not only inherit the design principles of the traditional IP technology was proposed, such as the end-to-end principle and layered decoupling principle, but also solve the problem that the service is too separated from the network.From the perspective of network evolution and future service requirements, the core issue of future IP networks is to strengthen the collaboration of between services and networks , and the improved IP network design principle “horizontal: end-to-end principle empowered by service-oriented network, vertical: layered model supported by intelligent control plane” was proposed, and based on this principle, the reference architecture of the future network was proposed.…”
Get full text
Article -
10434
OPTIMUM PRODUCTION AND CHARACTERIZATION OF BIODIESEL FROM MICROCYSTIS AERUGINOSA ALGAE
Published 2021-01-01“…Optimization with Minitab software was used to design the experiment using Central Composite Design (CCD). …”
Get full text
Article -
10435
An automatic verification method for software quality with real business data
Published 2024-03-01“…Furthermore, an architecture design for its corresponding TaaS service and a process automation scheme were introduced. …”
Get full text
Article -
10436
Blockchain-based ARP defense scheme
Published 2018-09-01“…In order to improve the difficulty of maintaining the static binding method when defending against ARP attacks,a defense method was designed with the features of low cost of defense and easy maintenance by using the idea of a blockchain technology.The blockchain structure had been improved,and the transaction index table structure had been designed to identify attacks and update data in a timely manner to prevent subsequent attacks.The content of the transaction index table was updated after the IP address was changed normally to ensure the correctness of the query.Analysis and experiments show that the blockchain-based defense method has the following merits:high security,guaranteeing the data is not tampered with,low cost of maintenance,and effective prevention against ARP spoofing attacks.…”
Get full text
Article -
10437
Secondary Use of Data: Non-Interventional Study Best Practices in Planning and Protocol Development
Published 2017-04-01“…Well established guidelines already exist that address best practices for Non-Interventional Study (NIS) design and methods. These guidelines provide advice on things to consider while designing a study and developing a protocol, but do not necessarily capture specific details related to the implementation of NIS. …”
Get full text
Article -
10438
INTERDISCIPLINARY ACTIVITY TRAINING IN VIRTUAL ENGINEERING ENVIRONMENT: AN ACTUAL STATE AND PROSPECTS
Published 2017-12-01“…These approaches include: creating the special environment (infrastructure) of interdisciplinary education such as the virtual organization representing a network of computerized workstations and training facilities for specialists and operators of various professions as well as digital models of work objects and means; designing of scenarios for multidisciplinary training for various types of multidisciplinary activities such as research, design, diagnostics, and management of technological processes; identifying, within the core curricula programs (CCP) of educational institutions, the disciplines or courses delivered in the multidisciplinary format and synchronized for different CCP through course scheduling.…”
Get full text
Article -
10439
Birds of a Feather: Alexander McQueen’s Victorian Bestiary
Published 2018-12-01“…In this essay the Victorian inspiration of his retro-futuristic designs will be studied to illustrate the uncanny persistence of some of the animalistic fantasies of the Victorian era into the contemporary world. …”
Get full text
Article -
10440
Low-latency networking:architecture,key scenarios and research prospect
Published 2019-08-01“…With the advent of delay-sensitive applications and ultra-low latency scenarios,research on low-latency networking is attracting attention from academia,industry,and standards organizations.Understanding the causes of latency and designing corresponding techniques to reduce latency enable the development of emerging applications.The sources of latency according to the layered architecture of the network was analyzed,and summarizes the techniques for reducing the latency.After that,three typical low-latency key scenarios and delay optimization techniques for data center network,5G and edge computing was analyzed.Finally,the opportunities and challenges that may be encountered in the development of low latency networks were presented from the perspectives of network architecture innovation,data-driven latency optimization algorithm and the design of new protocols.…”
Get full text
Article