Showing 10,581 - 10,600 results of 46,768 for search '"designer"', query time: 0.18s Refine Results
  1. 10581

    Simulation and Optimization of Metro Train Braking Rate under the Timing Condition by PAN Yang

    Published 2025-01-01
    “…As a conclusion, the train braking rate can be appropriately increased in the metro design and operation to save traction energy consumption.…”
    Get full text
    Article
  2. 10582

    Experimental and numerical study on seismic behaviors of SRC column-RC slab joints in NPP by Dayang Wang, Qiang Liu, Yuanqi Song, Yong Zhu, Yongshan Zhang

    Published 2025-02-01
    “…This paper presents an innovative design of a steel-reinforced concrete (SRC) column-reinforced concrete (RC) slab joint based on a concept of the strong column and weak slab. …”
    Get full text
    Article
  3. 10583

    Evaluating the Physical and Rheological Properties of Rejuvenated Styrene-Butadiene-Styrene-Modified Asphalt Binders by Xiaobing Chen, Juntian Wang, Xiaorui Zhang, Han Liu, Jinhu Tong, Ronglong Zhao

    Published 2020-01-01
    “…To evaluate the physical and rheological properties of rejuvenated styrene-butadiene-styrene-modified asphalt (SBSMA) binders designed for rapid in-place pavement recycling, an aged SBSMA binder was rejuvenated with three rejuvenators (i.e., Types I, II, and III) in different dosages. …”
    Get full text
    Article
  4. 10584

    Binary program taint analysis optimization method based on function summary by Pan YANG, Fei KANG, Hui SHU, Yuyao HUANG, Xiaoshao LYU

    Published 2023-04-01
    “…Taint analysis is a popular software analysis method, which has been widely used in the field of information security.Most of the existing binary program dynamic taint analysis frameworks use instruction-level instrumentation analysis methods, which usually generate huge performance overhead and reduce the program execution efficiency by several times or even dozens of times.This limits taint analysis technology’s wide usage in complex malicious samples and commercial software analysis.An optimization method of taint analysis based on function summary was proposed, to improve the efficiency of taint analysis, reduce the performance loss caused by instruction-level instrumentation analysis, and make taint analysis to be more widely used in software analysis.The taint analysis method based on function summary used function taint propagation rules instead of instruction taint propagation rules to reduce the number of data stream propagation analysis and effectively improve the efficiency of taint analysis.For function summary, the definition of function summary was proposed.And the summary generation algorithms of different function structures were studied.Inside the function, a path-sensitive analysis method was designed for acyclic structures.For cyclic structures, a finite iteration method was designed.Moreover, the two analysis methods were combined to solve the function summary generation of mixed structure functions.Based on this research, a general taint analysis framework called FSTaint was designed and implemented, consisting of a function summary generation module, a data flow recording module, and a taint analysis module.The efficiency of FSTaint was evaluated in the analysis of real APT malicious samples, where the taint analysis efficiency of FSTaint was found to be 7.75 times that of libdft, and the analysis efficiency was higher.In terms of accuracy, FSTaint has more accurate and complete propagation rules than libdft.…”
    Get full text
    Article
  5. 10585

    Optimizing orthodontic anchorage: comparative evaluation of larger diameter, shorter length mini-implants for enhanced mechanical stability by Swapnil Junnarkar, Anand Sabane, Amol Patil, Meenal Tepan, Tanisha Rout, Sonakshi Sharma, Arati Gholap

    Published 2024-12-01
    “…Fourteen mini-implants of each design were used to measure MIT and MRT. Seven mini-implants of each design were tested for lateral displacement. …”
    Get full text
    Article
  6. 10586

    New hash function based on C-MD structure and chaotic neural network by Liquan CHEN, Yuhang ZHU, Yu WANG, Zhongyuan QIN, Yang MA

    Published 2023-06-01
    “…In recent years, widely used hash algorithms such as MD5 and SHA-1 have been found to have varying degrees of security risks.The iterative structure of the SHA-2 algorithm is similar to that of SHA-1, making it vulnerable to attacks as well.Meanwhile, SHA-3 has a complex internal structure and low implementation efficiency.To address these issues, a keyed hash function was designed and implemented based on chaotic neural network and C-MD structure.The approach involved improving the Merkle-Damgard structure by proposing the chaotic neural network Merkle-Damgard (C-MD) structure.This structure can be used to design a hash function that can withstand attacks such as the middle attack, multiple collision attack, and second pre-image attack for long information.Besides, the chaotic neural network was used as the compression function to increase the complexity of the hash function and improve its collision resistance, while also enabling it to output multiple lengths.Moreover, a plaintext preprocessor was designed, which used the coupled image lattice to generate chaos sequence related to the length of the plaintext to fill the plaintext, thus enhancing the ability of the hash function to resist length expansion attacks.Simulation results demonstrate that the proposed hash function performs faster than SHA-2, SHA-3 and the same type of chaotic hash function proposed by Teh et al.It can resist second pre-image attack, multi-collision attack and differential attack, while also exhibiting better collision resistance and mapping uniformity.In addition, the proposed Hash function can output Hash values of different lengths, making it suitable for use in digital signature, key generation, Hash-based message authentication code, deterministic random bit generator, and other application fields.…”
    Get full text
    Article
  7. 10587

    Effectiveness of nurse-led multi-component intervention program (NLMIP) on improving antiretroviral therapy adherence, CD4 count, psychological distress, and quality of life of peo... by Gulati Sonia, Pandurangan Hariprasath, Gupta P. Kumar

    Published 2025-01-01
    “…Methods and Materials: The study will be conducted at the ART center of a selected 1532 bedded, multi-specialty, tertiary care, central government funded, teaching hospital in Delhi, India, during the years 2022–2024. The research design is a randomized controlled trial (pre-test-post-test, control group design/repeated measure design). …”
    Get full text
    Article
  8. 10588

    Estimating the Climate-Controlled Soil Parameters and the Distorted Mound Shape for Analysis of Stiffened Rafts on Expansive Soils by Mohamed H. Abu-Ali, Basuony El-Garhy, Ahmed Boraey, Wael S. Al-Rashed, Hassan Abdel-Daiem

    Published 2024-01-01
    “…In most design methods, the distorted mound shape is represented in 2D by the edge distance and the maximum differential movement through a nonlinear equation. …”
    Get full text
    Article
  9. 10589

    Numerical and Experimental Failure Analysis of Carbon Fiber-Reinforced Polymer-Based Pyrotechnic Separation Device by Mingfa Ren, Fei Weng, Jing Sun, Zhifeng Zhang, Zhiguo Ma, Tong Li

    Published 2020-01-01
    “…These studies on the failure modes of CFRPs under LSC provide important basis for the future design of CFRP-based pyrotechnic separation devices, which is important to the lightweight design of launching vehicles.…”
    Get full text
    Article
  10. 10590

    À la recherche des points-clefs de Gilbert Simondon autour d’un système d’information géographique by Stephan Kowal

    Published 2018-12-01
    “…In an effort to link digital cartography to architectural design, this article exemplifies the transition from representations based on the human eye, developed since the Renaissance, to the use of remote sensing devices and computer-generated imageries, pattern recognition, influencing decision-making and design, with the system’s capacity to generate new knowledge with the overlay and combination processes of point elements. …”
    Get full text
    Article
  11. 10591

    Investigation of Traffic Loading Effects for Different Codes on Medium- and Small-Span Girder Bridges in China by Qingfei Gao, Biao Wu, Jun Li, Kemeng Cui, Chuang Xu

    Published 2020-01-01
    “…With increasing traffic volume, the traffic load grade given by design codes has gradually increased. For new bridges, there is no problem, and the traffic load can be met through the requirements of the new code. …”
    Get full text
    Article
  12. 10592

    RESEARCH ON MECHANICAL PROPERTIES OF GRADIENT LATTICE STRUCTURES BASED ON VORONOI METHOD (MT) by LIN Wei, YANG FengShuang, SHI YingYu

    Published 2023-01-01
    “…In this experiment, “inward” gradient and “outward” gradient were designed, and five different lattice structures with gradient grades of 0.5, 0.6, 0.7, 0.8 and 0.9 were designed for “inward” and “outward” structures, respectively. …”
    Get full text
    Article
  13. 10593

    Pass-Transistor-Enabled Split Input Voltage Level Shifter for Ultra-Low-Power Applications by Chakali Chandrasekhar, Mohammed Mahaboob Basha, Sari Mohan Das, Oruganti Hemakesavulu, Mohan Dholvan, Javed Syed

    Published 2025-01-01
    “…The schematic structure could be able to convert voltages from low to high as well as high to low. The architecture design has the lowest silicon area. The implementation of the proposed design was taken under 55 nm CMOS technology. …”
    Get full text
    Article
  14. 10594
  15. 10595

    Patient education interventions for adolescent and young adult kidney transplant recipients- a scoping review. by Michael Corr, Clare McKeaveney, Fina Wurm, Aisling Courtney, Helen Noble

    Published 2023-01-01
    “…Lack of educational theory in intervention design 2.) Lack of patient/ stakeholder involvement 3.) …”
    Get full text
    Article
  16. 10596
  17. 10597

    Seismic Response of a Bridge Pile Foundation during a Shaking Table Test by Yunxiu Dong, Zhongju Feng, Jingbin He, Huiyun Chen, Guan Jiang, Honghua Yin

    Published 2019-01-01
    “…Puqian Bridge is located in a quake-prone area in an 8-degree seismic fortification intensity zone, and the design of the peak ground motion is the highest grade worldwide. …”
    Get full text
    Article
  18. 10598

    The Potential of Online Tasks to Facilitate Autonomous Language Learning with the Use of Online Dictionaries in a Higher Education ESP Classroom by Carolina Girón-García

    Published 2025-01-01
    “…., qualitative and quantitative data) and was developed in two stages: (1) Creation and design of the online task (i.e., Lesson integrated into a Moodle platform); design of three questionnaires administered before and after the experiment; and implementation of the OT with university students (N=171) enrolled in a Legal English course; and (2) collection of data and analysis. …”
    Get full text
    Article
  19. 10599
  20. 10600

    Perancangan Data Warehouse Rumah Sakit Berbasis Online Analytical Processing (OLAP) by Joko Purwanto, Renny Renny

    Published 2021-10-01
    “…The resulting OLAP will be a data warehouse design with various dimensions will produce the displays information in the form of a graph or chart so that the information is easy to read and understand by various parties.   …”
    Get full text
    Article