Suggested Topics within your search.
Suggested Topics within your search.
- Design 10
- Design and construction 10
- Research 7
- Methodology 6
- Web sites 6
- Dressmaking 4
- History 4
- Management 4
- Study and teaching 4
- Computer networks 3
- Computer-aided design 3
- Economic development 3
- Evaluation research (Social action programs) 3
- Human-computer interaction 3
- Moral and ethical aspects 3
- Pattern design 3
- Visual communication 3
- methods 3
- Advertising 2
- Application software 2
- Commercial art 2
- Computer animation 2
- Computer programs 2
- Computer-assisted instruction 2
- Curricula 2
- Curriculum planning 2
- Economic policy 2
- Economics 2
- Education 2
- Education, Elementary 2
-
11781
Chronic IVC occlusion caused by unopened filter after conversion: case report and literature review
Published 2025-01-01“…BackgroundThe VenaTech Convertible Vena Cava Filter (VTCF) is a device designed for insertion into the inferior vena cava (IVC) to prevent life-threatening pulmonary embolism (PE). …”
Get full text
Article -
11782
Time Varying Reliability Analysis of the MG 400/951 Shearer Cutting Part Planet Carrier
Published 2022-01-01“…Combined with reliability sensitivity design theory,the influence of multiple weak areas design variables on the time-varying reliability of the cutting part planet carrier is analyzed. …”
Get full text
Article -
11783
Radio-frequency cavity field measurements through free falling bead
Published 2025-01-01“…We detail the development and operational principles of this new method, including the design of a compact, portable measurement device that integrates a bead/droplet release system and a bead detection system linked to a vector network analyzer. …”
Get full text
Article -
11784
Behavior of FRP Link Slabs in Jointless Bridge Decks
Published 2012-01-01“…The outcome of the study supports the contention that jointless concrete bridge decks may be designed and constructed with fiberglass-reinforced plastic grid link slabs. …”
Get full text
Article -
11785
Prevention and Detection Research of Intelligent Sports Rehabilitation under the Background of Artificial Intelligence
Published 2022-01-01“…In the inner loop, a sliding mode iterative learning controller is designed to suppress periodic disturbance and abnormal jitter and achieve stable tracking of the target trajectory. …”
Get full text
Article -
11786
Detection and Prevention of Selective Forwarding-Based Denial-of-Service Attacks in WSNs
Published 2013-08-01“…Designing wireless sensor networks (WSNs) that can work reliably in the presence of inside packet drop attackers is very challenging. …”
Get full text
Article -
11787
Research and Application of the Formula for Calculating Discharge Coefficient of the Spillway Broad Crest Weir Based on the Binary Nonlinear Fitting
Published 2021-01-01“…In order to facilitate the use of the discharge coefficient table of broad crest weir in the current design code for Spillway of water conservancy,the discharge coefficient formula of broad crest weir is obtained by fitting the data in the current water conservancy code with bivariate rational function approximation.By Comparing the fitting formula with the current power code formula,the results show that the fitting formula is better than the current power code formula.By comparing the error indexes of fitting formula and power code formula,it is found that the error indexes of fitting formula are in the better range under each value of r/H,while the deviation of each error index of power code from the optimal value is small when r/H≥0.20.The fitting formula is used to calculate a series of discharge coefficients corresponding to water head at different fillet radii of a spillway broad crest weir.Through the analysis of the calculation results,it can be seen that the fitting formula can be used to calculate the discharge coefficient of broad crest weir in engineering design instead of consulting the water conservancy code table.…”
Get full text
Article -
11788
FORMATION OF CONFLICT MANAGEMENT COMPETENCE OF A UNIVERSITY TEACHER
Published 2018-02-01“…The structure of University teacher’s conflict management competence consists of interrelated components: gnostic, regulatory, design, reflexive and status, regulatory, communicative. …”
Get full text
Article -
11789
Dynamic Takagi-Sugeno Model for the Control of Ultrasonic Motor
Published 2011-01-01“…Model of ultrasonic motor is the foundation of the design of ultrasonic motor's speed and position controller. …”
Get full text
Article -
11790
Bulk Handling Facility Modeling and Simulation for Safeguards Analysis
Published 2018-01-01“…These models are used for designing the overall safeguards system, examining new safeguards approaches, virtually testing new measurement instrumentation, and analyzing diversion scenarios. …”
Get full text
Article -
11791
Study on Vehicle Load Model of Baijianhe Bridge
Published 2022-01-01“…According to the measured vehicle load data, the vehicle load suitable for Baijianhe Bridge is 1.1 times the highway-I vehicle load of the current Chinese standard “General Code for Design of Highway Bridges and Culvers” (JTG D60-2015).…”
Get full text
Article -
11792
Research on the Effects of Hydropneumatic Parameters on Tracked Vehicle Ride Safety Based on Cosimulation
Published 2017-01-01“…The results provide useful references for the optimal design and control of the parameters of a hydropneumatic suspension.…”
Get full text
Article -
11793
-
11794
Grouping Formation and Obstacle Avoidance Control of UAV Swarm Based on Synchronous DMPC
Published 2024-01-01“…Finally, the effectiveness of the designed algorithm and its superiority in obstacle avoidance are verified through simulations.…”
Get full text
Article -
11795
PENGARUH ALELOPATI SERESAH DAUN BAMBU (Dendrocalamus asper) PADA PERKECAMBAHAN KEDELAI (Glycine max L. Merril)
Published 2019-05-01“…The treated treatment is without litter solution of bamboo leaf, and dosage of 5%, 10%, and 15% bamboo leaf litter solution. The design used was a complete non factorial randomized design with 5x replication. …”
Get full text
Article -
11796
Massive access technology in 6G cellular Internet of things network
Published 2020-03-01“…To realize Internet of everything (IoE),the 6G cellular Internet of things (IoT) network need to provide wireless access with low power,massive connectivity and wide coverage.Through the analysis and research on the massive access technology in 6G cellular IoT network,especially in combination with the sporadic characteristics of IoT applications,a new access framework based on the grant-free random access protocol was designed to facilitate efficient massive access with limited spectrum resources.The proposed framework consisted of two phases.One was joint activity detection and channel estimation.The other was data transmission,which was divided into two categories,uplink data transmission and downlink data transmission,according to the different directions of data transmission.Due to the uncertainty of channel state information at the base station under the massive grant-free random access and considering the low power demand of 6G IoT devices,two robust uplink and downlink access algorithms were designed by maximizing the system energy efficiency.Extensive simulation results validate the effectiveness and robustness of the proposed algorithm.…”
Get full text
Article -
11797
Pairing-free certificateless blockchain-based access authentication method for spatial information network
Published 2024-08-01“…Furthermore, a certificateless public key without pairing and elliptic curve hybrid encryption algorithm based on blockchain was proposed, and an access authentication mechanism was designed to ensure the security of the access authentication process and the traceability of operations. …”
Get full text
Article -
11798
The Implementation of Merdeka Curriculum based on Teacher’s Perception
Published 2024-11-01“…Second, Merdeka Curriculum priority stage. Third, design principles and implementation mechanism of Merdeka Curriculum. …”
Get full text
Article -
11799
Motorcycle Parking Security System based on Website and QR Code Technology
Published 2023-09-01“…This research aims to design a motorcycle parking security system through a website in response to this challenge. …”
Get full text
Article -
11800
Construction method of attack scenario in cloud environment based on dynamic probabilistic attack graph
Published 2021-01-01“…Aiming at the problem of complex multi-step attack detection, the method of attack scenario construction oriented to cloud computing environment was studied.Firstly, a dynamic probabilistic attack graph model was constructed, and a probabilistic attack graph updating algorithm was designed to make it update periodically with the passage of time and space, so as to adapt to the elastic and dynamic cloud computing environment.Secondly, an attack intention inference algorithm and a maximum probability attack path inference algorithm were designed to solve the uncertain problems such as error and fracture of attack scenarios caused by false positive or false negative, and ensure the accuracy of attack scenario.Meanwhile, the attack scenario was dynamically evolved along with the dynamic probability attack graph to ensure the completeness and freshness of the attack scenario.Experimental results show that the proposed method can adapt to the elastic and dynamic cloud environment, restore the penetration process of attacker’s and reconstruct high-level attack scenario, and so provide certain references for building supervised and accountable cloud environment.…”
Get full text
Article