Showing 11,781 - 11,800 results of 46,768 for search '"designer"', query time: 0.14s Refine Results
  1. 11781

    Chronic IVC occlusion caused by unopened filter after conversion: case report and literature review by Shi Sheng, Yiqing Li

    Published 2025-01-01
    “…BackgroundThe VenaTech Convertible Vena Cava Filter (VTCF) is a device designed for insertion into the inferior vena cava (IVC) to prevent life-threatening pulmonary embolism (PE). …”
    Get full text
    Article
  2. 11782

    Time Varying Reliability Analysis of the MG 400/951 Shearer Cutting Part Planet Carrier by Minghao Li, Jie Qiao, Lijuan Zhao, Jiayi Fan, Meichen Zhang, Bing Luo

    Published 2022-01-01
    “…Combined with reliability sensitivity design theory,the influence of multiple weak areas design variables on the time-varying reliability of the cutting part planet carrier is analyzed. …”
    Get full text
    Article
  3. 11783

    Radio-frequency cavity field measurements through free falling bead by Xiaonan Du, Lars Groening

    Published 2025-01-01
    “…We detail the development and operational principles of this new method, including the design of a compact, portable measurement device that integrates a bead/droplet release system and a bead detection system linked to a vector network analyzer. …”
    Get full text
    Article
  4. 11784

    Behavior of FRP Link Slabs in Jointless Bridge Decks by Aziz Saber, Ashok Reddy Aleti

    Published 2012-01-01
    “…The outcome of the study supports the contention that jointless concrete bridge decks may be designed and constructed with fiberglass-reinforced plastic grid link slabs. …”
    Get full text
    Article
  5. 11785

    Prevention and Detection Research of Intelligent Sports Rehabilitation under the Background of Artificial Intelligence by Qiong Huang, Fubin Wang

    Published 2022-01-01
    “…In the inner loop, a sliding mode iterative learning controller is designed to suppress periodic disturbance and abnormal jitter and achieve stable tracking of the target trajectory. …”
    Get full text
    Article
  6. 11786

    Detection and Prevention of Selective Forwarding-Based Denial-of-Service Attacks in WSNs by Youngho Cho, Gang Qu

    Published 2013-08-01
    “…Designing wireless sensor networks (WSNs) that can work reliably in the presence of inside packet drop attackers is very challenging. …”
    Get full text
    Article
  7. 11787

    Research and Application of the Formula for Calculating Discharge Coefficient of the Spillway Broad Crest Weir Based on the Binary Nonlinear Fitting by YAN Zhifang, JIA Yunfei, WANG Yu

    Published 2021-01-01
    “…In order to facilitate the use of the discharge coefficient table of broad crest weir in the current design code for Spillway of water conservancy,the discharge coefficient formula of broad crest weir is obtained by fitting the data in the current water conservancy code with bivariate rational function approximation.By Comparing the fitting formula with the current power code formula,the results show that the fitting formula is better than the current power code formula.By comparing the error indexes of fitting formula and power code formula,it is found that the error indexes of fitting formula are in the better range under each value of r/H,while the deviation of each error index of power code from the optimal value is small when r/H≥0.20.The fitting formula is used to calculate a series of discharge coefficients corresponding to water head at different fillet radii of a spillway broad crest weir.Through the analysis of the calculation results,it can be seen that the fitting formula can be used to calculate the discharge coefficient of broad crest weir in engineering design instead of consulting the water conservancy code table.…”
    Get full text
    Article
  8. 11788

    FORMATION OF CONFLICT MANAGEMENT COMPETENCE OF A UNIVERSITY TEACHER by I. V. NIKULINA, N. V. SOLOVOVA

    Published 2018-02-01
    “…The structure of University teacher’s conflict management competence consists of interrelated components: gnostic, regulatory, design, reflexive and status, regulatory, communicative. …”
    Get full text
    Article
  9. 11789

    Dynamic Takagi-Sugeno Model for the Control of Ultrasonic Motor by Shi Jingzhuo, Lv Lin, Zhang Yu

    Published 2011-01-01
    “…Model of ultrasonic motor is the foundation of the design of ultrasonic motor's speed and position controller. …”
    Get full text
    Article
  10. 11790

    Bulk Handling Facility Modeling and Simulation for Safeguards Analysis by Benjamin B. Cipiti, Nathan Shoman

    Published 2018-01-01
    “…These models are used for designing the overall safeguards system, examining new safeguards approaches, virtually testing new measurement instrumentation, and analyzing diversion scenarios. …”
    Get full text
    Article
  11. 11791

    Study on Vehicle Load Model of Baijianhe Bridge by Zeying Yang, Yinglin Sun, Jianbo Qu, Chenghe Wang, Tianmin Wang

    Published 2022-01-01
    “…According to the measured vehicle load data, the vehicle load suitable for Baijianhe Bridge is 1.1 times the highway-I vehicle load of the current Chinese standard “General Code for Design of Highway Bridges and Culvers” (JTG D60-2015).…”
    Get full text
    Article
  12. 11792

    Research on the Effects of Hydropneumatic Parameters on Tracked Vehicle Ride Safety Based on Cosimulation by Shousong Han, Zhiqiang Chao, Xiangbo Liu

    Published 2017-01-01
    “…The results provide useful references for the optimal design and control of the parameters of a hydropneumatic suspension.…”
    Get full text
    Article
  13. 11793
  14. 11794

    Grouping Formation and Obstacle Avoidance Control of UAV Swarm Based on Synchronous DMPC by Yunfeng He, Xianjun Shi, Jianhua Lu, Chaolun Zhao, Guorong Zhao

    Published 2024-01-01
    “…Finally, the effectiveness of the designed algorithm and its superiority in obstacle avoidance are verified through simulations.…”
    Get full text
    Article
  15. 11795

    PENGARUH ALELOPATI SERESAH DAUN BAMBU (Dendrocalamus asper) PADA PERKECAMBAHAN KEDELAI (Glycine max L. Merril) by Lutfy Ditya Cahyanti

    Published 2019-05-01
    “…The treated treatment is without litter solution of bamboo leaf, and dosage of 5%, 10%, and 15% bamboo leaf litter solution. The design used was a complete non factorial randomized design with 5x replication. …”
    Get full text
    Article
  16. 11796

    Massive access technology in 6G cellular Internet of things network by Feiyan TIAN, Xiaoming CHEN, Caijun ZHONG, Zhaoyang ZHANG

    Published 2020-03-01
    “…To realize Internet of everything (IoE),the 6G cellular Internet of things (IoT) network need to provide wireless access with low power,massive connectivity and wide coverage.Through the analysis and research on the massive access technology in 6G cellular IoT network,especially in combination with the sporadic characteristics of IoT applications,a new access framework based on the grant-free random access protocol was designed to facilitate efficient massive access with limited spectrum resources.The proposed framework consisted of two phases.One was joint activity detection and channel estimation.The other was data transmission,which was divided into two categories,uplink data transmission and downlink data transmission,according to the different directions of data transmission.Due to the uncertainty of channel state information at the base station under the massive grant-free random access and considering the low power demand of 6G IoT devices,two robust uplink and downlink access algorithms were designed by maximizing the system energy efficiency.Extensive simulation results validate the effectiveness and robustness of the proposed algorithm.…”
    Get full text
    Article
  17. 11797

    Pairing-free certificateless blockchain-based access authentication method for spatial information network by HUO Ru, WANG Zhihao, SHAO Zihao, HUANG Tao

    Published 2024-08-01
    “…Furthermore, a certificateless public key without pairing and elliptic curve hybrid encryption algorithm based on blockchain was proposed, and an access authentication mechanism was designed to ensure the security of the access authentication process and the traceability of operations. …”
    Get full text
    Article
  18. 11798

    The Implementation of Merdeka Curriculum based on Teacher’s Perception by Eva Meidi Kulsum, Luluk Wiji Asti Suloso

    Published 2024-11-01
    “…Second, Merdeka Curriculum priority stage. Third, design principles and implementation mechanism of Merdeka Curriculum. …”
    Get full text
    Article
  19. 11799

    Motorcycle Parking Security System based on Website and QR Code Technology by Riva Andra Yuni, Werman Kasoep, Desta Yolanda

    Published 2023-09-01
    “…This research aims to design a motorcycle parking security system through a website in response to this challenge. …”
    Get full text
    Article
  20. 11800

    Construction method of attack scenario in cloud environment based on dynamic probabilistic attack graph by Wenjuan WANG, Xuehui DU, Dibin SHAN

    Published 2021-01-01
    “…Aiming at the problem of complex multi-step attack detection, the method of attack scenario construction oriented to cloud computing environment was studied.Firstly, a dynamic probabilistic attack graph model was constructed, and a probabilistic attack graph updating algorithm was designed to make it update periodically with the passage of time and space, so as to adapt to the elastic and dynamic cloud computing environment.Secondly, an attack intention inference algorithm and a maximum probability attack path inference algorithm were designed to solve the uncertain problems such as error and fracture of attack scenarios caused by false positive or false negative, and ensure the accuracy of attack scenario.Meanwhile, the attack scenario was dynamically evolved along with the dynamic probability attack graph to ensure the completeness and freshness of the attack scenario.Experimental results show that the proposed method can adapt to the elastic and dynamic cloud environment, restore the penetration process of attacker’s and reconstruct high-level attack scenario, and so provide certain references for building supervised and accountable cloud environment.…”
    Get full text
    Article